Table of Contents
MS-7206 User’s Guide
16
26.4 VLAN Stacking ................................................................................................................. 176
Chapter 27
Multicast ................................................................................................................................179
27.1 Multicast Overview .........................................................................................................179
27.1.1 IP Multicast Addresses ........................................................................................... 179
27.1.2 IGMP Filtering ........................................................................................................179
27.1.3 IGMP Snooping ..................................................................................................... 180
27.1.4 IGMP Snooping and VLANs ................................................................................... 180
27.2 Multicast Status .............................................................................................................. 180
27.3 Multicast Setting ............................................................................................................. 181
27.4 IGMP Snooping VLAN .................................................................................................... 183
27.5 IGMP Filtering Profile ..................................................................................................... 185
27.6 MVR Overview ................................................................................................................. 186
27.6.1 Types of MVR Ports ...............................................................................................187
27.6.2 MVR Modes ........................................................................................................... 187
27.6.3 How MVR Works ....................................................................................................187
27.7 MVR ................................................................................................................................. 188
27.8 Group Configuration .......................................................................................................190
27.8.1 MVR Configuration Example .................................................................................. 192
Chapter 28
AAA........................................................................................................................................195
28.1 Authentication, Authorization and Accounting (AAA) ..................................................... 195
28.1.1 Local User Accounts ..............................................................................................196
28.1.2 RADIUS and TACACS+ ........................................................................................196
28.2 AAA Screens ................................................................................................................... 196
28.2.1 RADIUS Server Setup ........................................................................................ 197
28.2.2 TACACS+ Server Setup ..................................................................................... 199
28.2.3 AAA Setup .............................................................................................................201
28.2.4 Vendor Specific Attribute ........................................................................................ 204
28.2.5 Tunnel Protocol Attribute ........................................................................................ 205
Chapter 29
IP Source Guard....................................................................................................................207
29.1 IP Source Guard Overview .............................................................................................. 207
29.1.1 DHCP Snooping Overview .....................................................................................208
29.1.2 ARP Inspection Overview ...................................................................................... 210
29.2 IP Source Guard ...............................................................................................................211
29.3 IP Source Guard Static Binding ....................................................................................... 212
29.4 DHCP Snooping .............................................................................................................. 215
29.5 DHCP Snooping Configure .............................................................................................. 218
29.5.1 DHCP Snooping Port Configure ............................................................................. 220